Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TYPHOON: mobile distributed hash tables., , and . J. Parallel Distrib. Comput., 65 (2): 191-206 (2005)Effectively Generating and Delivering Personalized Product Information: Adopting the Web 2.0 Approach., and . AINA Workshops, page 401-406. IEEE Computer Society, (2010)ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction., , and . IEEE Trans. Dependable Sec. Comput., 13 (5): 568-581 (2016)Minimizing Both the Number of Clusters and the Variation of Cluster Sizes for Mobile Ad Hoc Networks., and . ICOIN, volume 2662 of Lecture Notes in Computer Science, page 682-691. Springer, (2003)An Experimental Study of the Printed-Circuit Elliptic Dipole Antenna with 1.5-16 GHz Bandwidth., , , and . IJCNS, 1 (4): 295-300 (2008)Building a tuple space on structured peer-to-peer networks., , , , and . The Journal of Supercomputing, 40 (3): 213-227 (2007)Extraction of Baseball Trajectory and Physics-Based Validation for Single-View Baseball Video Sequences., , and . ICME, page 1813-1816. IEEE Computer Society, (2006)MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern., , , and . J. Inf. Sci. Eng., 31 (2): 455-473 (2015)IoT Security: Ongoing Challenges and Research Opportunities., , , , , and . SOCA, page 230-234. IEEE Computer Society, (2014)An Arduino-Based Resonant Cradle Design with Infant Cries Recognition., , , and . Sensors, 15 (8): 18934-18949 (2015)